?
Solved

double encryption

Posted on 2011-09-09
7
Medium Priority
?
420 Views
Last Modified: 2012-05-12
Is there any benefits in enforcing double encryption on my corproatye laptop.

Let me explain - all laptop devices come with pointsec installed - yet I sometimes have to store quite sensitive data locally on my device - could I not put something like truecrypt on and then encrypt these files when they are saved locally.

My fear is when I logon to truecrypt I essentially "unencrypt" eevrything - but I cant quite get my head around how encrypting certain files again really improves things.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 9

Assisted Solution

by:akitsupport
akitsupport earned 400 total points
ID: 36509273
In many ways your just doubling up.  If the main solution your using is good enough why use another?

You could also end up with one item causing issues with the other as well.

0
 
LVL 3

Author Comment

by:pma111
ID: 36509350
I was wondering perhaps if I got infected by malware - as I unencrypt when I boot my machine with pointsec - the malware could see / send any documents - anything sensitive should remain encrypted "always" unless specifically needed, whereas pointsec opens "all my files" when I authenticate" - truecrypt would keep those high sensitive ones encrypted unless I manually mounted that file via authentication
0
 
LVL 9

Expert Comment

by:akitsupport
ID: 36509400
I would think as you have an encryption software your using a good anti virus though?

I'd consider using malwarebytes in conjunction with what you ahve if your really worried.

0
What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

 
LVL 3

Author Comment

by:pma111
ID: 36509837
Yeah I guess I am overparanoid
0
 
LVL 32

Accepted Solution

by:
aleghart earned 800 total points
ID: 36512312
It's not overly paranoid.  Once you logon to the OS, your user credentials can be used by anyone with local or remote access.  This means your local files (even if encrypted by the OS), your network files, even connections to network servers & workstations...because your logon credentials are unlocked and used without challenge.

Decent password protection software offers the ability to challenge before using the credentials.  LastPass, for instance, can logon to a site or show locked info automatically, or only after a password challenge.

Same can be done for your sensitive files.  3rd-party encryption (even as simple as a ZIP file) would decrease exposure.  It wouldn't stop somebody from stealing your files if you were hacked or forced to logon to your computer.  But, you would have an amount of time you could reasonably expect some of that data to be safe.  This gives you the chance to make the data irrelevant, or at least take measures to warn others and secure other assets against the breach.

Traveling internationally, your computer is subject to seizure and search.  You may be required to logon to your computer or face detention.  Your computer can also be confiscated for later search.  (This is for the U.S. ...your country may vary.)
0
 
LVL 9

Assisted Solution

by:gtkfreak
gtkfreak earned 400 total points
ID: 36515177
Double encryption offers one more layer of protection. therefore, at times i too do that. You can also have truecrypt encryption for the whole volume, and within that one more layer of encryption on some truecrypt containers that have sensitive files. End of day, once you log into to your system, anything going across a network will be unencrypted or plaintext. Just an additional encryption layer on sensitive files.

During travel, you are required to enter a password to allow law enforcement to search your computer, but an additional encrypted container may not require you to enter that password, unless it is detected during the search. However, truecrypt does offer hidden volumes to help avoid detection. The operative word is avoid and not evade.
0
 
LVL 12

Assisted Solution

by:coredatarecovery
coredatarecovery earned 400 total points
ID: 36515228
Truecrypt is a great solution in this case
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question